Information risk and impacts to individuals following personal data breaches guidance for IG professionals
This guidance provides detailed information on the potential negative impacts or risks associated with the breach of certain types of information and actions that may need to be taken
Risk factors
The expandable fields below describe risks associated with the breach of certain types of information. Whether these risks apply may depend on a number of factors. These should be considered when assessing whether a risk described below is relevant, and the level of the risk.
Who has accessed the information and what are their intentions?
The identity of the party who have accessed the data and their intentions for accessing the data will impact the level of risk. For example:
- if a member of staff emailed information to the wrong colleague, and the recipient colleague immediately deleted the email, the risk to any individuals would reduce as a result
- if a member of staff intentionally accesses information about a person in order to contact them for personal reasons, the risk of negative consequence materialising may increase
- if the access to the information was by a malicious third party intending to publish the information online, the risk of a negative consequence materialising may increase
- if the information has been published somewhere where it can be accessed more widely, for example on the dark web, then the risks of further access by third parties and negative impact may greatly increase
Is the access ongoing, or have copies been taken?
You may need to consult with technical experts or teams to determine whether access is ongoing or not (for example, whether exfiltration is continuing). Whether the party who has accessed the data continue to have access to the information will impact the possibility of negative outcomes. For example:
- if the access or disclosure was a one-off and the party who has accessed the data (such as a malicious third party or a member of staff) no longer has access and was not able to take copies, they are unlikely to be able to use this information further therefore the risk may reduce
- if the third party continue to have access to or a copy of the information, depending on the information, the risk may increase
Is the source of the information known?
The source of the information may reveal information about the data subject that is not explicitly contained in the breached data sets, and this would need to be considered in the risk assessment. For example:
- if the data breached only contains a name and an address, this may be assessed as low risk - however, if the source of the data is known to be a fertility clinic for example, then there may be a greater risk to the individual if the breach discloses their engagement with this setting
Who is the information about?
Are there any special circumstances about the individual who the data relates to which may increase or reduce the risk. For example:
- in the case of a child who has been removed from their parents, the breach of an address may present significantly greater risk of harm than in other cases
- in the case of a vulnerable adult, they may be at higher risk of being susceptible to scamming and fraud than an adult who is not considered vulnerable
- in the case of a high-profile individual, breached information may attract more attention and have a higher chance of causing reputational damage or distress
How sensitive is the information?
The information itself may be particularly sensitive in light of its nature. For example:
- not all clinical information carries the same level of sensitivity - information relating to fertility treatments or sexually transmitted diseases are typically more sensitive than a routine blood pressure test or a COVID test result
- for adult social care, you may hold additional information about a person receiving care which is particularly sensitive, such as bank account details or access codes to their home
Risks and mitigations by dataset
This section provides further information on the risks associated with the loss or alteration of particular data sets. The mitigations listed here are specific to the immediate reduction of risk to the individual. Depending on the size and structure of your organisation, these may need to be undertaken by different departments within an organisation. Whether or not these risks apply may be subject to the risk factors above. For further information on assessing risks and the severity of a breach, see our guidance on personal data breaches.
These lists are not exhaustive particulars of a breach can present a variety of different risks. It is important that each breach is assessed on a case by case basis.
Health and Care Information Governance Working Group
The portal exists to provide clear and consistent IG advice and guidance to patients and service users, health and care staff and IG professionals. NHS England convenes a working group to check and challenge the guidance.
Last edited: 7 May 2026 4:47 pm